Examples of inappropriate and unacceptable use of computing and networking resources include: … Harassment of other users (e.g., continuing to send electronic communications when the recipient has requested that you cease, sending threatening messages).